2020-05-09 10:25:23 +00:00
|
|
|
=================
|
2006-09-19 19:43:34 +00:00
|
|
|
Kexec/Kdump HOWTO
|
2020-05-09 10:25:23 +00:00
|
|
|
=================
|
|
|
|
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
Introduction
|
2020-05-09 10:25:23 +00:00
|
|
|
============
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Kexec and kdump are new features in the 2.6 mainstream kernel. These features
|
|
|
|
are included in Red Hat Enterprise Linux 5. The purpose of these features
|
|
|
|
is to ensure faster boot up and creation of reliable kernel vmcores for
|
|
|
|
diagnostic purposes.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
|
2006-09-19 19:43:34 +00:00
|
|
|
Overview
|
2020-05-09 10:25:23 +00:00
|
|
|
========
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
Kexec
|
2020-05-09 10:25:23 +00:00
|
|
|
-----
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Kexec is a fastboot mechanism which allows booting a Linux kernel from the
|
|
|
|
context of already running kernel without going through BIOS. BIOS can be very
|
|
|
|
time consuming especially on the big servers with lots of peripherals. This can
|
|
|
|
save a lot of time for developers who end up booting a machine numerous times.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
Kdump
|
2020-05-09 10:25:23 +00:00
|
|
|
-----
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Kdump is a new kernel crash dumping mechanism and is very reliable because
|
|
|
|
the crash dump is captured from the context of a freshly booted kernel and
|
|
|
|
not from the context of the crashed kernel. Kdump uses kexec to boot into
|
|
|
|
a second kernel whenever system crashes. This second kernel, often called
|
|
|
|
a capture kernel, boots with very little memory and captures the dump image.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
The first kernel reserves a section of memory that the second kernel uses
|
|
|
|
to boot. Kexec enables booting the capture kernel without going through BIOS
|
|
|
|
hence contents of first kernel's memory are preserved, which is essentially
|
|
|
|
the kernel crash dump.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Kdump is supported on the i686, x86_64, ia64 and ppc64 platforms. The
|
2010-06-13 19:20:48 +00:00
|
|
|
standard kernel and capture kernel are one in the same on i686, x86_64,
|
|
|
|
ia64 and ppc64.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
If you're reading this document, you should already have kexec-tools
|
|
|
|
installed. If not, you install it via the following command:
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
# yum install kexec-tools
|
|
|
|
|
|
|
|
Now load a kernel with kexec:
|
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
# kver=`uname -r` # kexec -l /boot/vmlinuz-$kver
|
|
|
|
--initrd=/boot/initrd-$kver.img \
|
2006-09-19 19:43:34 +00:00
|
|
|
--command-line="`cat /proc/cmdline`"
|
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
NOTE: The above will boot you back into the kernel you're currently running,
|
|
|
|
if you want to load a different kernel, substitute it in place of `uname -r`.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
Now reboot your system, taking note that it should bypass the BIOS:
|
|
|
|
|
|
|
|
# reboot
|
|
|
|
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
How to configure kdump
|
|
|
|
======================
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Again, we assume if you're reading this document, you should already have
|
|
|
|
kexec-tools installed. If not, you install it via the following command:
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
# yum install kexec-tools
|
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
To be able to do much of anything interesting in the way of debug analysis,
|
|
|
|
you'll also need to install the kernel-debuginfo package, of the same arch
|
|
|
|
as your running kernel, and the crash utility:
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
# yum --enablerepo=\*debuginfo install kernel-debuginfo.$(uname -m) crash
|
|
|
|
|
2010-06-13 19:20:48 +00:00
|
|
|
Next up, we need to modify some boot parameters to reserve a chunk of memory for
|
2013-06-06 10:16:05 +00:00
|
|
|
the capture kernel. With the help of grubby, it's very easy to append
|
|
|
|
"crashkernel=128M" to the end of your kernel boot parameters. Note that the X
|
2010-06-13 19:20:48 +00:00
|
|
|
values are such that X = the amount of memory to reserve for the capture kernel.
|
2013-06-06 10:16:05 +00:00
|
|
|
And based on arch and system configuration, one might require more than 128M to
|
|
|
|
be reserved for kdump. One need to experiment and test kdump, if 128M is not
|
|
|
|
sufficient, try reserving more memory.
|
|
|
|
|
|
|
|
# grubby --args="crashkernel=128M" --update-kernel=/boot/vmlinuz-`uname -r`
|
2010-06-13 19:20:48 +00:00
|
|
|
|
|
|
|
Note that there is an alternative form in which to specify a crashkernel
|
|
|
|
memory reservation, in the event that more control is needed over the size and
|
|
|
|
placement of the reserved memory. The format is:
|
|
|
|
|
|
|
|
crashkernel=range1:size1[,range2:size2,...][@offset]
|
|
|
|
|
|
|
|
Where range<n> specifies a range of values that are matched against the amount
|
|
|
|
of physical RAM present in the system, and the corresponding size<n> value
|
|
|
|
specifies the amount of kexec memory to reserve. For example:
|
|
|
|
|
|
|
|
crashkernel=512M-2G:64M,2G-:128M
|
|
|
|
|
|
|
|
This line tells kexec to reserve 64M of ram if the system contains between
|
|
|
|
512M and 2G of physical memory. If the system contains 2G or more of physical
|
|
|
|
memory, 128M should be reserved.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2019-03-26 08:33:18 +00:00
|
|
|
Besides, since kdump needs to access /proc/kallsyms during a kernel
|
|
|
|
loading if KASLR is enabled, check /proc/sys/kernel/kptr_restrict to
|
|
|
|
make sure that the content of /proc/kallsyms is exposed correctly.
|
|
|
|
We recommend to set the value of kptr_restrict to '1'. Otherwise
|
|
|
|
capture kernel loading could fail.
|
|
|
|
|
2010-06-13 19:20:48 +00:00
|
|
|
After making said changes, reboot your system, so that the X MB of memory is
|
|
|
|
left untouched by the normal system, reserved for the capture kernel. Take note
|
|
|
|
that the output of 'free -m' will show X MB less memory than without this
|
|
|
|
parameter, which is expected. You may be able to get by with less than 128M, but
|
|
|
|
testing with only 64M has proven unreliable of late. On ia64, as much as 512M
|
|
|
|
may be required.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Now that you've got that reserved memory region set up, you want to turn on
|
|
|
|
the kdump init script:
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
# chkconfig kdump on
|
|
|
|
|
|
|
|
Then, start up kdump as well:
|
|
|
|
|
2012-07-12 03:15:36 +00:00
|
|
|
# systemctl start kdump.service
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
This should load your kernel-kdump image via kexec, leaving the system ready
|
|
|
|
to capture a vmcore upon crashing. To test this out, you can force-crash
|
|
|
|
your system by echo'ing a c into /proc/sysrq-trigger:
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
# echo c > /proc/sysrq-trigger
|
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
You should see some panic output, followed by the system restarting into
|
|
|
|
the kdump kernel. When the boot process gets to the point where it starts
|
|
|
|
the kdump service, your vmcore should be copied out to disk (by default,
|
|
|
|
in /var/crash/<YYYY-MM-DD-HH:MM>/vmcore), then the system rebooted back into
|
|
|
|
your normal kernel.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Once back to your normal kernel, you can use the previously installed crash
|
|
|
|
kernel in conjunction with the previously installed kernel-debuginfo to
|
|
|
|
perform postmortem analysis:
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
# crash /usr/lib/debug/lib/modules/2.6.17-1.2621.el5/vmlinux
|
|
|
|
/var/crash/2006-08-23-15:34/vmcore
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
crash> bt
|
|
|
|
|
|
|
|
and so on...
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
|
|
|
|
Notes on kdump
|
|
|
|
==============
|
2019-05-10 07:09:44 +00:00
|
|
|
|
|
|
|
When kdump starts, the kdump kernel is loaded together with the kdump
|
|
|
|
initramfs. To save memory usage and disk space, the kdump initramfs is
|
|
|
|
generated strictly against the system it will run on, and contains the
|
|
|
|
minimum set of kernel modules and utilities to boot the machine to a stage
|
|
|
|
where the dump target could be mounted.
|
|
|
|
|
|
|
|
With kdump service enabled, kdumpctl will try to detect possible system
|
|
|
|
change and rebuild the kdump initramfs if needed. But it can not guarantee
|
|
|
|
to cover every possible case. So after a hardware change, disk migration,
|
|
|
|
storage setup update or any similar system level changes, it's highly
|
|
|
|
recommended to rebuild the initramfs manually with following command:
|
|
|
|
|
|
|
|
# kdumpctl rebuild
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
|
2013-05-13 03:13:27 +00:00
|
|
|
Saving vmcore-dmesg.txt
|
2020-05-09 10:25:23 +00:00
|
|
|
=======================
|
|
|
|
|
2013-05-13 03:13:27 +00:00
|
|
|
Kernel log bufferes are one of the most important information available
|
|
|
|
in vmcore. Now before saving vmcore, kernel log bufferes are extracted
|
|
|
|
from /proc/vmcore and saved into a file vmcore-dmesg.txt. After
|
|
|
|
vmcore-dmesg.txt, vmcore is saved. Destination disk and directory for
|
|
|
|
vmcore-dmesg.txt is same as vmcore. Note that kernel log buffers will
|
|
|
|
not be available if dump target is raw device.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
|
|
|
|
Dump Triggering methods
|
|
|
|
=======================
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
This section talks about the various ways, other than a Kernel Panic, in which
|
|
|
|
Kdump can be triggered. The following methods assume that Kdump is configured
|
|
|
|
on your system, with the scripts enabled as described in the section above.
|
|
|
|
|
|
|
|
1) AltSysRq C
|
|
|
|
|
|
|
|
Kdump can be triggered with the combination of the 'Alt','SysRq' and 'C'
|
|
|
|
keyboard keys. Please refer to the following link for more details:
|
|
|
|
|
|
|
|
http://kbase.redhat.com/faq/FAQ_43_5559.shtm
|
|
|
|
|
|
|
|
In addition, on PowerPC boxes, Kdump can also be triggered via Hardware
|
|
|
|
Management Console(HMC) using 'Ctrl', 'O' and 'C' keyboard keys.
|
|
|
|
|
|
|
|
2) NMI_WATCHDOG
|
|
|
|
|
|
|
|
In case a machine has a hard hang, it is quite possible that it does not
|
|
|
|
respond to keyboard interrupts. As a result 'Alt-SysRq' keys will not help
|
|
|
|
trigger a dump. In such scenarios Nmi Watchdog feature can prove to be useful.
|
|
|
|
The following link has more details on configuring Nmi watchdog option.
|
|
|
|
|
|
|
|
http://kbase.redhat.com/faq/FAQ_85_9129.shtm
|
|
|
|
|
|
|
|
Once this feature has been enabled in the kernel, any lockups will result in an
|
|
|
|
OOPs message to be generated, followed by Kdump being triggered.
|
|
|
|
|
|
|
|
3) Kernel OOPs
|
|
|
|
|
|
|
|
If we want to generate a dump everytime the Kernel OOPses, we can achieve this
|
|
|
|
by setting the 'Panic On OOPs' option as follows:
|
|
|
|
|
|
|
|
# echo 1 > /proc/sys/kernel/panic_on_oops
|
|
|
|
|
|
|
|
This is enabled by default on RHEL5.
|
|
|
|
|
|
|
|
4) NMI(Non maskable interrupt) button
|
|
|
|
|
|
|
|
In cases where the system is in a hung state, and is not accepting keyboard
|
|
|
|
interrupts, using NMI button for triggering Kdump can be very useful. NMI
|
|
|
|
button is present on most of the newer x86 and x86_64 machines. Please refer
|
|
|
|
to the User guides/manuals to locate the button, though in most occasions it
|
|
|
|
is not very well documented. In most cases it is hidden behind a small hole
|
|
|
|
on the front or back panel of the machine. You could use a toothpick or some
|
|
|
|
other non-conducting probe to press the button.
|
|
|
|
|
|
|
|
For example, on the IBM X series 366 machine, the NMI button is located behind
|
|
|
|
a small hole on the bottom center of the rear panel.
|
|
|
|
|
|
|
|
To enable this method of dump triggering using NMI button, you will need to set
|
|
|
|
the 'unknown_nmi_panic' option as follows:
|
|
|
|
|
|
|
|
# echo 1 > /proc/sys/kernel/unknown_nmi_panic
|
|
|
|
|
|
|
|
5) PowerPC specific methods:
|
|
|
|
|
|
|
|
On IBM PowerPC machines, issuing a soft reset invokes the XMON debugger(if
|
|
|
|
XMON is configured). To configure XMON one needs to compile the kernel with
|
|
|
|
the CONFIG_XMON and CONFIG_XMON_DEFAULT options, or by compiling with
|
|
|
|
CONFIG_XMON and booting the kernel with xmon=on option.
|
|
|
|
|
|
|
|
Following are the ways to remotely issue a soft reset on PowerPC boxes, which
|
|
|
|
would drop you to XMON. Pressing a 'X' (capital alphabet X) followed by an
|
|
|
|
'Enter' here will trigger the dump.
|
|
|
|
|
|
|
|
5.1) HMC
|
|
|
|
|
|
|
|
Hardware Management Console(HMC) available on Power4 and Power5 machines allow
|
|
|
|
partitions to be reset remotely. This is specially useful in hang situations
|
|
|
|
where the system is not accepting any keyboard inputs.
|
|
|
|
|
|
|
|
Once you have HMC configured, the following steps will enable you to trigger
|
|
|
|
Kdump via a soft reset:
|
|
|
|
|
|
|
|
On Power4
|
|
|
|
Using GUI
|
|
|
|
|
|
|
|
* In the right pane, right click on the partition you wish to dump.
|
|
|
|
* Select "Operating System->Reset".
|
|
|
|
* Select "Soft Reset".
|
|
|
|
* Select "Yes".
|
|
|
|
|
|
|
|
Using HMC Commandline
|
|
|
|
|
|
|
|
# reset_partition -m <machine> -p <partition> -t soft
|
|
|
|
|
|
|
|
On Power5
|
|
|
|
Using GUI
|
|
|
|
|
|
|
|
* In the right pane, right click on the partition you wish to dump.
|
|
|
|
* Select "Restart Partition".
|
|
|
|
* Select "Dump".
|
|
|
|
* Select "OK".
|
|
|
|
|
|
|
|
Using HMC Commandline
|
|
|
|
|
|
|
|
# chsysstate -m <managed system name> -n <lpar name> -o dumprestart -r lpar
|
|
|
|
|
|
|
|
5.2) Blade Management Console for Blade Center
|
|
|
|
|
|
|
|
To initiate a dump operation, go to Power/Restart option under "Blade Tasks" in
|
|
|
|
the Blade Management Console. Select the corresponding blade for which you want
|
|
|
|
to initate the dump and then click "Restart blade with NMI". This issues a
|
|
|
|
system reset and invokes xmon debugger.
|
|
|
|
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Advanced Setups
|
|
|
|
===============
|
|
|
|
|
|
|
|
Dump targets
|
|
|
|
------------
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
In addition to being able to capture a vmcore to your system's local file
|
|
|
|
system, kdump can be configured to capture a vmcore to a number of other
|
|
|
|
locations, including a raw disk partition, a dedicated file system, an NFS
|
|
|
|
mounted file system, or a remote system via ssh/scp. Additional options
|
|
|
|
exist for specifying the relative path under which the dump is captured,
|
|
|
|
what to do if the capture fails, and for compressing and filtering the dump
|
|
|
|
(so as to produce smaller, more manageable, vmcore files).
|
|
|
|
|
|
|
|
In theory, dumping to a location other than the local file system should be
|
|
|
|
safer than kdump's default setup, as its possible the default setup will try
|
|
|
|
dumping to a file system that has become corrupted. The raw disk partition and
|
|
|
|
dedicated file system options allow you to still dump to the local system,
|
|
|
|
but without having to remount your possibly corrupted file system(s),
|
|
|
|
thereby decreasing the chance a vmcore won't be captured. Dumping to an
|
|
|
|
NFS server or remote system via ssh/scp also has this advantage, as well
|
|
|
|
as allowing for the centralization of vmcore files, should you have several
|
|
|
|
systems from which you'd like to obtain vmcore files. Of course, note that
|
|
|
|
these configurations could present problems if your network is unreliable.
|
|
|
|
|
|
|
|
Advanced setups are configured via modifications to /etc/kdump.conf,
|
|
|
|
which out of the box, is fairly well documented itself. Any alterations to
|
|
|
|
/etc/kdump.conf should be followed by a restart of the kdump service, so
|
|
|
|
the changes can be incorporated in the kdump initrd. Restarting the kdump
|
2012-07-12 03:15:36 +00:00
|
|
|
service is as simple as '/sbin/systemctl restart kdump.service'.
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
Note that kdump.conf is used as a configuration mechanism for capturing dump
|
|
|
|
files from the initramfs (in the interests of safety), the root file system is
|
|
|
|
mounted, and the init process is started, only as a last resort if the
|
|
|
|
initramfs fails to capture the vmcore. As such, configuration made in
|
|
|
|
/etc/kdump.conf is only applicable to capture recorded in the initramfs. If
|
|
|
|
for any reason the init process is started on the root file system, only a
|
|
|
|
simple copying of the vmcore from /proc/vmcore to /var/crash/$DATE/vmcore will
|
|
|
|
be preformed.
|
|
|
|
|
2012-08-31 02:05:37 +00:00
|
|
|
For both local filesystem and nfs dump the dump target must be mounted before
|
|
|
|
building kdump initramfs. That means one needs to put an entry for the dump
|
|
|
|
file system in /etc/fstab so that after reboot when kdump service starts,
|
|
|
|
it can find the dump target and build initramfs instead of failing.
|
2012-11-27 04:48:56 +00:00
|
|
|
Usually the dump target should be used only for kdump. If you worry about
|
|
|
|
someone uses the filesystem for something else other than dumping vmcore
|
|
|
|
you can mount it as read-only. Mkdumprd will still remount it as read-write
|
|
|
|
for creating dump directory and will move it back to read-only afterwards.
|
2012-08-31 02:05:37 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Followings are the available config options for dump targets.
|
|
|
|
|
|
|
|
1) Raw partition
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
Raw partition dumping requires that a disk partition in the system, at least
|
|
|
|
as large as the amount of memory in the system, be left unformatted. Assuming
|
2012-10-10 07:09:15 +00:00
|
|
|
/dev/vg/lv_kdump is left unformatted, kdump.conf can be configured with
|
|
|
|
'raw /dev/vg/lv_kdump', and the vmcore file will be copied via dd directly
|
|
|
|
onto partition /dev/vg/lv_kdump. Restart the kdump service via
|
|
|
|
'/sbin/systemctl restart kdump.service' to commit this change to your kdump
|
|
|
|
initrd. Dump target should be persistent device name, such as lvm or device
|
|
|
|
mapper canonical name.
|
2008-06-05 15:18:53 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
2) Dedicated file system
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
Similar to raw partition dumping, you can format a partition with the file
|
2012-08-31 02:05:37 +00:00
|
|
|
system of your choice, Again, it should be at least as large as the amount
|
|
|
|
of memory in the system. Assuming it should be at least as large as the
|
2012-10-10 07:09:15 +00:00
|
|
|
amount of memory in the system. Assuming /dev/vg/lv_kdump has been
|
|
|
|
formatted ext4, specify 'ext4 /dev/vg/lv_kdump' in kdump.conf, and a
|
|
|
|
vmcore file will be copied onto the file system after it has been mounted.
|
|
|
|
Dumping to a dedicated partition has the advantage that you can dump multiple
|
|
|
|
vmcores to the file system, space permitting, without overwriting previous ones,
|
|
|
|
as would be the case in a raw partition setup. Restart the kdump service via
|
2012-08-31 02:05:37 +00:00
|
|
|
'/sbin/systemctl restart kdump.service' to commit this change to
|
2010-06-13 19:20:48 +00:00
|
|
|
your kdump initrd. Note that for local file systems ext4 and ext2 are
|
2008-06-05 15:18:53 +00:00
|
|
|
supported as dumpable targets. Kdump will not prevent you from specifying
|
|
|
|
other filesystems, and they will most likely work, but their operation
|
|
|
|
cannot be guaranteed. for instance specifying a vfat filesystem or msdos
|
|
|
|
filesystem will result in a successful load of the kdump service, but during
|
|
|
|
crash recovery, the dump will fail if the system has more than 2GB of memory
|
|
|
|
(since vfat and msdos filesystems do not support more than 2GB files).
|
|
|
|
Be careful of your filesystem selection when using this target.
|
|
|
|
|
2012-10-10 07:09:15 +00:00
|
|
|
It is recommended to use persistent device names or UUID/LABEL for file system
|
|
|
|
dumps. One example of persistent device is /dev/vg/<devname>.
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
3) NFS mount
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
Dumping over NFS requires an NFS server configured to export a file system
|
|
|
|
with full read/write access for the root user. All operations done within
|
|
|
|
the kdump initial ramdisk are done as root, and to write out a vmcore file,
|
|
|
|
we obviously must be able to write to the NFS mount. Configuring an NFS
|
|
|
|
server is outside the scope of this document, but either the no_root_squash
|
|
|
|
or anonuid options on the NFS server side are likely of interest to permit
|
|
|
|
the kdump initrd operations write to the NFS mount as root.
|
|
|
|
|
|
|
|
Assuming your're exporting /dump on the machine nfs-server.example.com,
|
2012-08-31 02:04:54 +00:00
|
|
|
once the mount is properly configured, specify it in kdump.conf, via
|
|
|
|
'nfs nfs-server.example.com:/dump'. The server portion can be specified either
|
2008-06-05 15:18:53 +00:00
|
|
|
by host name or IP address. Following a system crash, the kdump initrd will
|
|
|
|
mount the NFS mount and copy out the vmcore to your NFS server. Restart the
|
2012-08-31 02:05:37 +00:00
|
|
|
kdump service via '/sbin/systemctl restart kdump.service' to commit this change
|
|
|
|
to your kdump initrd.
|
2008-06-05 15:18:53 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
4) Special mount via "dracut_args"
|
2016-08-26 03:47:38 +00:00
|
|
|
|
|
|
|
You can utilize "dracut_args" to pass "--mount" to kdump, see dracut manpage
|
|
|
|
about the format of "--mount" for details. If there is any "--mount" specified
|
|
|
|
via "dracut_args", kdump will build it as the mount target without doing any
|
|
|
|
validation (mounting or checking like mount options, fs size, save path, etc),
|
|
|
|
so you must test it to ensure all the correctness. You cannot use other targets
|
|
|
|
in /etc/kdump.conf if you use "--mount" in "dracut_args". You also cannot specify
|
|
|
|
mutliple "--mount" targets via "dracut_args".
|
|
|
|
|
|
|
|
One use case of "--mount" in "dracut_args" is you do not want to mount dump target
|
|
|
|
before kdump service startup, for example, to reduce the burden of the shared nfs
|
|
|
|
server. Such as the example below:
|
|
|
|
dracut_args --mount "192.168.1.1:/share /mnt/test nfs4 defaults"
|
|
|
|
|
|
|
|
NOTE:
|
|
|
|
- <mountpoint> must be specified as an absolute path.
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
5) Remote system via ssh/scp
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
Dumping over ssh/scp requires setting up passwordless ssh keys for every
|
|
|
|
machine you wish to have dump via this method. First up, configure kdump.conf
|
2012-07-23 07:31:28 +00:00
|
|
|
for ssh/scp dumping, adding a config line of 'ssh user@server', where 'user'
|
2008-06-05 15:18:53 +00:00
|
|
|
can be any user on the target system you choose, and 'server' is the host
|
|
|
|
name or IP address of the target system. Using a dedicated, restricted user
|
|
|
|
account on the target system is recommended, as there will be keyless ssh
|
|
|
|
access to this account.
|
|
|
|
|
2012-07-12 03:15:36 +00:00
|
|
|
Once kdump.conf is appropriately configured, issue the command
|
|
|
|
'kdumpctl propagate' to automatically set up the ssh host keys and transmit
|
2008-06-05 15:18:53 +00:00
|
|
|
the necessary bits to the target server. You'll have to type in 'yes'
|
|
|
|
to accept the host key for your targer server if this is the first time
|
|
|
|
you've connected to it, and then input the target system user's password
|
|
|
|
to send over the necessary ssh key file. Restart the kdump service via
|
2012-07-12 03:15:36 +00:00
|
|
|
'/sbin/systemctl restart kdump.service' to commit this change to your kdump initrd.
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
Path
|
2020-05-09 10:25:23 +00:00
|
|
|
----
|
|
|
|
|
2014-04-11 12:27:03 +00:00
|
|
|
"path" represents the file system path in which vmcore will be saved. In
|
|
|
|
fact kdump creates a directory $hostip-$date with-in "path" and saves
|
|
|
|
vmcore there. So practically dump is saved in $path/$hostip-$date/. To
|
|
|
|
simplify discussion further, if we say dump will be saved in $path, it
|
|
|
|
is implied that kdump will create another directory inside path and
|
|
|
|
save vmcore there.
|
|
|
|
|
|
|
|
If a dump target is specified in kdump.conf, then "path" is relative to the
|
|
|
|
specified dump target. For example, if dump target is "ext4 /dev/sda", then
|
|
|
|
dump will be saved in "$path" directory on /dev/sda.
|
|
|
|
|
|
|
|
Same is the case for nfs dump. If user specified "nfs foo.com:/export/tmp/"
|
|
|
|
as dump target, then dump will effectively be saved in
|
|
|
|
"foo.com:/export/tmp/var/crash/" directory.
|
|
|
|
|
|
|
|
Interpretation of path changes a bit if user has not specified a dump
|
|
|
|
target explicitly in kdump.conf. In this case, "path" represents the
|
|
|
|
absolute path from root. And dump target and adjusted path are arrived
|
|
|
|
at automatically depending on what's mounted in the current system.
|
|
|
|
|
|
|
|
Following are few examples.
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- path /var/crash/
|
|
|
|
|
|
|
|
Assuming there is no disk mounted on /var/ or on /var/crash, dump will
|
|
|
|
be saved on disk backing rootfs in directory /var/crash.
|
|
|
|
|
|
|
|
- path /var/crash/ (A separate disk mounted on /var)
|
2014-04-11 12:27:03 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Say a disk /dev/sdb is mouted on /var. In this case dump target will
|
|
|
|
become /dev/sdb and path will become "/crash" and dump will be saved
|
|
|
|
on "sdb:/crash/" directory.
|
2014-04-11 12:27:03 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- path /var/crash/ (NFS mounted on /var)
|
|
|
|
|
|
|
|
Say foo.com:/export/tmp is mounted on /var. In this case dump target is
|
|
|
|
nfs server and path will be adjusted to "/crash" and dump will be saved to
|
|
|
|
foo.com:/export/tmp/crash/ directory.
|
2008-06-05 15:18:53 +00:00
|
|
|
|
2015-01-28 08:22:47 +00:00
|
|
|
Kdump boot directory
|
2020-05-09 10:25:23 +00:00
|
|
|
--------------------
|
|
|
|
|
2015-01-28 08:22:47 +00:00
|
|
|
Usually kdump kernel is the same as 1st kernel. So kdump will try to find
|
|
|
|
kdump kernel under /boot according to /proc/cmdline. E.g we execute below
|
|
|
|
command and get an output:
|
|
|
|
cat /proc/cmdline
|
|
|
|
BOOT_IMAGE=/xxx/vmlinuz-3.yyy.zzz root=xxxx .....
|
|
|
|
Then kdump kernel will be /boot/xxx/vmlinuz-3.yyy.zzz.
|
|
|
|
However a variable KDUMP_BOOTDIR in /etc/sysconfig/kdump is provided to
|
|
|
|
user if kdump kernel is put in a different directory.
|
2008-06-05 15:18:53 +00:00
|
|
|
|
2012-06-14 01:57:30 +00:00
|
|
|
Kdump Post-Capture Executable
|
2020-05-09 10:25:23 +00:00
|
|
|
-----------------------------
|
2012-06-14 01:57:30 +00:00
|
|
|
|
|
|
|
It is possible to specify a custom script or binary you wish to run following
|
|
|
|
an attempt to capture a vmcore. The executable is passed an exit code from
|
|
|
|
the capture process, which can be used to trigger different actions from
|
|
|
|
within your post-capture executable.
|
|
|
|
|
|
|
|
Kdump Pre-Capture Executable
|
2020-05-09 10:25:23 +00:00
|
|
|
----------------------------
|
2012-06-14 01:57:30 +00:00
|
|
|
|
|
|
|
It is possible to specify a custom script or binary you wish to run before
|
|
|
|
capturing a vmcore. Exit status of this binary is interpreted:
|
|
|
|
0 - continue with dump process as usual
|
|
|
|
non 0 - reboot the system
|
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Extra Binaries
|
2020-05-09 10:25:23 +00:00
|
|
|
--------------
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
If you have specific binaries or scripts you want to have made available
|
|
|
|
within your kdump initrd, you can specify them by their full path, and they
|
|
|
|
will be included in your kdump initrd, along with all dependent libraries.
|
2012-06-14 01:57:30 +00:00
|
|
|
This may be particularly useful for those running post-capture scripts that
|
|
|
|
rely on other binaries.
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
Extra Modules
|
2020-05-09 10:25:23 +00:00
|
|
|
-------------
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
By default, only the bare minimum of kernel modules will be included in your
|
|
|
|
kdump initrd. Should you wish to capture your vmcore files to a non-boot-path
|
|
|
|
storage device, such as an iscsi target disk or clustered file system, you may
|
|
|
|
need to manually specify additional kernel modules to load into your kdump
|
|
|
|
initrd.
|
|
|
|
|
2019-01-17 20:31:23 +00:00
|
|
|
Failure action
|
2020-05-09 10:25:23 +00:00
|
|
|
--------------
|
|
|
|
|
2019-01-17 20:31:23 +00:00
|
|
|
Failure action specifies what to do when dump to configured dump target
|
|
|
|
fails. By default, failure action is "reboot" and that is system reboots
|
Change dump_to_rootfs to be a default option and reboot to be default action
Firstly rename dump_rootfs to dump_to_rootfs to remove the ambiguity
about dump_rootfs. Then add it as one of default options. That means
user can specify dump_to_rootfs to be default action manually, then
it will take action when specified target dump failed.
Secondly, in rhel7 and fedora, when default action is not specified,
the default 'default' is dump_to_rootfs. Namely when specified target
dump failed, the kdump initrd will mount root and save kdump from
initramfs context. However in rhel6, the default 'default' is 'reboot'.
That means when specified target dump failed, the kdump initrd will
reboot systems. For being consistent with rhel6, change the default
'default' back to 'reboot'. And this can also keep logic simple, easier
to understand. Primarily, Our default dump target is root filesystem.
So keeping "default" as "dump_to_rootfs" and trying to dump to root
filesystem again when first attempt fails does not make much sense.
Meanwhile add the relevant description into kdump.conf,kdump.conf.5
and kexec-kdump-howto.txt.
Signed-off-by: Baoquan He <bhe@redhat.com>
Acked-by: Dave Young <dyoung@redhat.com>
Acked-by: Vivek Goyal <vgoyal@redhat.com>
2013-03-01 07:14:19 +00:00
|
|
|
if attempt to save dump to dump target fails.
|
|
|
|
|
2019-01-17 20:31:23 +00:00
|
|
|
There are other failure actions available though.
|
Change dump_to_rootfs to be a default option and reboot to be default action
Firstly rename dump_rootfs to dump_to_rootfs to remove the ambiguity
about dump_rootfs. Then add it as one of default options. That means
user can specify dump_to_rootfs to be default action manually, then
it will take action when specified target dump failed.
Secondly, in rhel7 and fedora, when default action is not specified,
the default 'default' is dump_to_rootfs. Namely when specified target
dump failed, the kdump initrd will mount root and save kdump from
initramfs context. However in rhel6, the default 'default' is 'reboot'.
That means when specified target dump failed, the kdump initrd will
reboot systems. For being consistent with rhel6, change the default
'default' back to 'reboot'. And this can also keep logic simple, easier
to understand. Primarily, Our default dump target is root filesystem.
So keeping "default" as "dump_to_rootfs" and trying to dump to root
filesystem again when first attempt fails does not make much sense.
Meanwhile add the relevant description into kdump.conf,kdump.conf.5
and kexec-kdump-howto.txt.
Signed-off-by: Baoquan He <bhe@redhat.com>
Acked-by: Dave Young <dyoung@redhat.com>
Acked-by: Vivek Goyal <vgoyal@redhat.com>
2013-03-01 07:14:19 +00:00
|
|
|
|
|
|
|
- dump_to_rootfs
|
2020-05-09 10:25:23 +00:00
|
|
|
This option tries to mount root and save dump on root filesystem
|
|
|
|
in a path specified by "path". This option will generally make
|
|
|
|
sense when dump target is not root filesystem. For example, if
|
|
|
|
dump is being saved over network using "ssh" then one can specify
|
|
|
|
failure action to "dump_to_rootfs" to try saving dump to root
|
|
|
|
filesystem if dump over network fails.
|
Change dump_to_rootfs to be a default option and reboot to be default action
Firstly rename dump_rootfs to dump_to_rootfs to remove the ambiguity
about dump_rootfs. Then add it as one of default options. That means
user can specify dump_to_rootfs to be default action manually, then
it will take action when specified target dump failed.
Secondly, in rhel7 and fedora, when default action is not specified,
the default 'default' is dump_to_rootfs. Namely when specified target
dump failed, the kdump initrd will mount root and save kdump from
initramfs context. However in rhel6, the default 'default' is 'reboot'.
That means when specified target dump failed, the kdump initrd will
reboot systems. For being consistent with rhel6, change the default
'default' back to 'reboot'. And this can also keep logic simple, easier
to understand. Primarily, Our default dump target is root filesystem.
So keeping "default" as "dump_to_rootfs" and trying to dump to root
filesystem again when first attempt fails does not make much sense.
Meanwhile add the relevant description into kdump.conf,kdump.conf.5
and kexec-kdump-howto.txt.
Signed-off-by: Baoquan He <bhe@redhat.com>
Acked-by: Dave Young <dyoung@redhat.com>
Acked-by: Vivek Goyal <vgoyal@redhat.com>
2013-03-01 07:14:19 +00:00
|
|
|
|
|
|
|
- shell
|
2020-05-09 10:25:23 +00:00
|
|
|
Drop into a shell session inside initramfs.
|
|
|
|
|
Change dump_to_rootfs to be a default option and reboot to be default action
Firstly rename dump_rootfs to dump_to_rootfs to remove the ambiguity
about dump_rootfs. Then add it as one of default options. That means
user can specify dump_to_rootfs to be default action manually, then
it will take action when specified target dump failed.
Secondly, in rhel7 and fedora, when default action is not specified,
the default 'default' is dump_to_rootfs. Namely when specified target
dump failed, the kdump initrd will mount root and save kdump from
initramfs context. However in rhel6, the default 'default' is 'reboot'.
That means when specified target dump failed, the kdump initrd will
reboot systems. For being consistent with rhel6, change the default
'default' back to 'reboot'. And this can also keep logic simple, easier
to understand. Primarily, Our default dump target is root filesystem.
So keeping "default" as "dump_to_rootfs" and trying to dump to root
filesystem again when first attempt fails does not make much sense.
Meanwhile add the relevant description into kdump.conf,kdump.conf.5
and kexec-kdump-howto.txt.
Signed-off-by: Baoquan He <bhe@redhat.com>
Acked-by: Dave Young <dyoung@redhat.com>
Acked-by: Vivek Goyal <vgoyal@redhat.com>
2013-03-01 07:14:19 +00:00
|
|
|
- halt
|
2020-05-09 10:25:23 +00:00
|
|
|
Halt system after failure
|
|
|
|
|
Change dump_to_rootfs to be a default option and reboot to be default action
Firstly rename dump_rootfs to dump_to_rootfs to remove the ambiguity
about dump_rootfs. Then add it as one of default options. That means
user can specify dump_to_rootfs to be default action manually, then
it will take action when specified target dump failed.
Secondly, in rhel7 and fedora, when default action is not specified,
the default 'default' is dump_to_rootfs. Namely when specified target
dump failed, the kdump initrd will mount root and save kdump from
initramfs context. However in rhel6, the default 'default' is 'reboot'.
That means when specified target dump failed, the kdump initrd will
reboot systems. For being consistent with rhel6, change the default
'default' back to 'reboot'. And this can also keep logic simple, easier
to understand. Primarily, Our default dump target is root filesystem.
So keeping "default" as "dump_to_rootfs" and trying to dump to root
filesystem again when first attempt fails does not make much sense.
Meanwhile add the relevant description into kdump.conf,kdump.conf.5
and kexec-kdump-howto.txt.
Signed-off-by: Baoquan He <bhe@redhat.com>
Acked-by: Dave Young <dyoung@redhat.com>
Acked-by: Vivek Goyal <vgoyal@redhat.com>
2013-03-01 07:14:19 +00:00
|
|
|
- poweroff
|
2020-05-09 10:25:23 +00:00
|
|
|
Poweroff system after failure.
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
Compression and filtering
|
2020-05-09 10:25:23 +00:00
|
|
|
-------------------------
|
2008-06-05 15:18:53 +00:00
|
|
|
|
|
|
|
The 'core_collector' parameter in kdump.conf allows you to specify a custom
|
|
|
|
dump capture method. The most common alternate method is makedumpfile, which
|
|
|
|
is a dump filtering and compression utility provided with kexec-tools. On
|
|
|
|
some architectures, it can drastically reduce the size of your vmcore files,
|
|
|
|
which becomes very useful on systems with large amounts of memory.
|
|
|
|
|
2013-12-05 05:06:57 +00:00
|
|
|
A typical setup is 'core_collector makedumpfile -F -l --message-level 1 -d 31',
|
2012-06-08 03:38:01 +00:00
|
|
|
but check the output of '/sbin/makedumpfile --help' for a list of all available
|
|
|
|
options (-i and -g don't need to be specified, they're automatically taken care
|
|
|
|
of). Note that use of makedumpfile requires that the kernel-debuginfo package
|
|
|
|
corresponding with your running kernel be installed.
|
|
|
|
|
|
|
|
Core collector command format depends on dump target type. Typically for
|
|
|
|
filesystem (local/remote), core_collector should accept two arguments.
|
|
|
|
First one is source file and second one is target file. For ex.
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- ex1.
|
|
|
|
|
|
|
|
core_collector "cp --sparse=always"
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Above will effectively be translated to:
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
cp --sparse=always /proc/vmcore <dest-path>/vmcore
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- ex2.
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
core_collector "makedumpfile -l --message-level 1 -d 31"
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Above will effectively be translated to:
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
makedumpfile -l --message-level 1 -d 31 /proc/vmcore <dest-path>/vmcore
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2012-06-14 01:56:10 +00:00
|
|
|
For dump targets like raw and ssh, in general, core collector should expect
|
2012-06-08 03:38:01 +00:00
|
|
|
one argument (source file) and should output the processed core on standard
|
2012-06-14 01:56:10 +00:00
|
|
|
output (There is one exception of "scp", discussed later). This standard
|
|
|
|
output will be saved to destination using appropriate commands.
|
2012-06-08 03:38:01 +00:00
|
|
|
|
|
|
|
raw dumps core_collector examples:
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- ex3.
|
|
|
|
|
|
|
|
core_collector "cat"
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Above will effectively be translated to.
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
cat /proc/vmcore | dd of=<target-device>
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- ex4.
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
core_collector "makedumpfile -F -l --message-level 1 -d 31"
|
|
|
|
|
|
|
|
Above will effectively be translated to.
|
|
|
|
|
|
|
|
makedumpfile -F -l --message-level 1 -d 31 | dd of=<target-device>
|
2012-06-08 03:38:01 +00:00
|
|
|
|
2012-06-14 01:56:10 +00:00
|
|
|
ssh dumps core_collector examples:
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- ex5.
|
|
|
|
|
|
|
|
core_collector "cat"
|
2012-06-14 01:56:10 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Above will effectively be translated to.
|
2012-06-14 01:56:10 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
cat /proc/vmcore | ssh <options> <remote-location> "dd of=path/vmcore"
|
2012-06-14 01:56:10 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- ex6.
|
2012-06-14 01:56:10 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
core_collector "makedumpfile -F -l --message-level 1 -d 31"
|
|
|
|
|
|
|
|
Above will effectively be translated to.
|
|
|
|
|
|
|
|
makedumpfile -F -l --message-level 1 -d 31 | ssh <options> <remote-location> "dd of=path/vmcore"
|
2012-06-14 01:56:10 +00:00
|
|
|
|
|
|
|
There is one exception to standard output rule for ssh dumps. And that is
|
|
|
|
scp. As scp can handle ssh destinations for file transfers, one can
|
|
|
|
specify "scp" as core collector for ssh targets (no output on stdout).
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
- ex7.
|
2012-06-14 01:56:10 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
core_collector "scp"
|
2012-06-14 01:56:10 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Above will effectively be translated to.
|
|
|
|
|
|
|
|
scp /proc/vmcore <user@host>:path/vmcore
|
2012-06-14 01:56:10 +00:00
|
|
|
|
2012-06-08 03:38:01 +00:00
|
|
|
About default core collector
|
|
|
|
----------------------------
|
2020-05-09 10:25:23 +00:00
|
|
|
|
2012-06-08 03:38:01 +00:00
|
|
|
Default core_collector for ssh/raw dump is:
|
2013-12-05 05:06:57 +00:00
|
|
|
"makedumpfile -F -l --message-level 1 -d 31".
|
2012-06-08 03:38:01 +00:00
|
|
|
Default core_collector for other targets is:
|
2013-12-05 05:06:57 +00:00
|
|
|
"makedumpfile -l --message-level 1 -d 31".
|
2012-06-08 03:38:01 +00:00
|
|
|
|
|
|
|
Even if core_collector option is commented out in kdump.conf, makedumpfile
|
|
|
|
is default core collector and kdump uses it internally.
|
|
|
|
|
|
|
|
If one does not want makedumpfile as default core_collector, then they
|
|
|
|
need to specify one using core_collector option to change the behavior.
|
|
|
|
|
|
|
|
Note: If "makedumpfile -F" is used then you will get a flattened format
|
|
|
|
vmcore.flat, you will need to use "makedumpfile -R" to rearrange the
|
|
|
|
dump data from stdard input to a normal dumpfile (readable with analysis
|
|
|
|
tools).
|
|
|
|
For example: "makedumpfile -R vmcore < vmcore.flat"
|
2008-06-05 15:18:53 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
|
|
|
|
Caveats
|
|
|
|
=======
|
2006-09-19 19:43:34 +00:00
|
|
|
|
2008-06-05 15:18:53 +00:00
|
|
|
Console frame-buffers and X are not properly supported. If you typically run
|
|
|
|
with something along the lines of "vga=791" in your kernel config line or
|
|
|
|
have X running, console video will be garbled when a kernel is booted via
|
|
|
|
kexec. Note that the kdump kernel should still be able to create a dump,
|
|
|
|
and when the system reboots, video should be restored to normal.
|
2006-09-19 19:43:34 +00:00
|
|
|
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Notes
|
|
|
|
=====
|
|
|
|
|
2008-07-28 11:26:50 +00:00
|
|
|
Notes on resetting video:
|
2020-05-09 10:25:23 +00:00
|
|
|
-------------------------
|
2008-07-28 11:26:50 +00:00
|
|
|
|
|
|
|
Video is a notoriously difficult issue with kexec. Video cards contain ROM code
|
|
|
|
that controls their initial configuration and setup. This code is nominally
|
|
|
|
accessed and executed from the Bios, and otherwise not safely executable. Since
|
|
|
|
the purpose of kexec is to reboot the system without re-executing the Bios, it
|
|
|
|
is rather difficult if not impossible to reset video cards with kexec. The
|
|
|
|
result is, that if a system crashes while running in a graphical mode (i.e.
|
|
|
|
running X), the screen may appear to become 'frozen' while the dump capture is
|
|
|
|
taking place. A serial console will of course reveal that the system is
|
|
|
|
operating and capturing a vmcore image, but a casual observer will see the
|
|
|
|
system as hung until the dump completes and a true reboot is executed.
|
|
|
|
|
|
|
|
There are two possiblilties to work around this issue. One is by adding
|
|
|
|
--reset-vga to the kexec command line options in /etc/sysconfig/kdump. This
|
|
|
|
tells kdump to write some reasonable default values to the video card register
|
|
|
|
file, in the hopes of returning it to a text mode such that boot messages are
|
|
|
|
visible on the screen. It does not work with all video cards however.
|
|
|
|
Secondly, it may be worth trying to add vga15fb.ko to the extra_modules list in
|
|
|
|
/etc/kdump.conf. This will attempt to use the video card in framebuffer mode,
|
|
|
|
which can blank the screen prior to the start of a dump capture.
|
2012-07-12 03:15:35 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Notes on rootfs mount
|
|
|
|
---------------------
|
|
|
|
|
2012-07-12 03:15:35 +00:00
|
|
|
Dracut is designed to mount rootfs by default. If rootfs mounting fails it
|
|
|
|
will refuse to go on. So kdump leaves rootfs mounting to dracut currently.
|
|
|
|
We make the assumtion that proper root= cmdline is being passed to dracut
|
|
|
|
initramfs for the time being. If you need modify "KDUMP_COMMANDLINE=" in
|
|
|
|
/etc/sysconfig/kdump, you will need to make sure that appropriate root=
|
|
|
|
options are copied from /proc/cmdline. In general it is best to append
|
|
|
|
command line options using "KDUMP_COMMANDLINE_APPEND=" instead of replacing
|
|
|
|
the original command line completely.
|
2013-06-14 14:56:40 +00:00
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Notes on watchdog module handling
|
|
|
|
---------------------------------
|
2016-07-20 18:12:22 +00:00
|
|
|
|
|
|
|
If a watchdog is active in first kernel then, we must have it's module
|
|
|
|
loaded in crash kernel, so that either watchdog is deactivated or started
|
|
|
|
being kicked in second kernel. Otherwise, we might face watchdog reboot
|
|
|
|
when vmcore is being saved. When dracut watchdog module is enabled, it
|
|
|
|
installs kernel watchdog module of active watchdog device in initrd.
|
|
|
|
kexec-tools always add "-a watchdog" to the dracut_args if there exists at
|
|
|
|
least one active watchdog and user has not added specifically "-o watchdog"
|
|
|
|
in dracut_args of kdump.conf. If a watchdog module (such as hp_wdt) has
|
|
|
|
not been written in watchdog-core framework then this option will not have
|
|
|
|
any effect and module will not be added. Please note that only systemd
|
|
|
|
watchdog daemon is supported as watchdog kick application.
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Notes for disk images
|
|
|
|
---------------------
|
2019-05-10 07:09:44 +00:00
|
|
|
|
|
|
|
Kdump initramfs is a critical component for capturing the crash dump.
|
|
|
|
But it's strictly generated for the machine it will run on, and have
|
|
|
|
no generality. If you install a new machine with a previous disk image
|
|
|
|
(eg. VMs created with disk image or snapshot), kdump could be broken
|
|
|
|
easily due to hardware changes or disk ID changes. So it's strongly
|
|
|
|
recommended to not include the kdump initramfs in the disk image in the
|
|
|
|
first place, this helps to save space, and kdumpctl will build the
|
|
|
|
initramfs automatically if it's missing. If you have already installed
|
|
|
|
a machine with a disk image which have kdump initramfs embedded, you
|
|
|
|
should rebuild the initramfs using "kdumpctl rebuild" command manually,
|
|
|
|
or else kdump may not work as expeceted.
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Notes on encrypted dump target
|
|
|
|
------------------------------
|
2019-05-10 07:11:26 +00:00
|
|
|
|
|
|
|
Currently, kdump is not working well with encrypted dump target.
|
|
|
|
First, user have to give the password manually in capture kernel,
|
|
|
|
so a working interactive terminal is required in the capture kernel.
|
|
|
|
And another major issue is that an OOM problem will occur with certain
|
|
|
|
encryption setup. For example, the default setup for LUKS2 will use a
|
|
|
|
memory hard key derivation function to mitigate brute force attach,
|
|
|
|
it's impossible to reduce the memory usage for mounting the encrypted
|
|
|
|
target. In such case, you have to either reserved enough memory for
|
|
|
|
crash kernel according, or update your encryption setup.
|
|
|
|
It's recommanded to use a non-encrypted target (eg. remote target)
|
|
|
|
instead.
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
Notes on device dump
|
|
|
|
--------------------
|
2019-05-29 09:00:43 +00:00
|
|
|
|
|
|
|
Device dump allows drivers to append dump data to vmcore, so you can
|
|
|
|
collect driver specified debug info. The drivers could append the
|
|
|
|
data without any limit, and the data is stored in memory, this may
|
|
|
|
bring a significant memory stress. So device dump is disabled by default
|
|
|
|
by passing "novmcoredd" command line option to the kdump capture kernel.
|
|
|
|
If you want to collect debug data with device dump, you need to modify
|
|
|
|
"KDUMP_COMMANDLINE_APPEND=" value in /etc/sysconfig/kdump and remove the
|
|
|
|
"novmcoredd" option. You also need to increase the "crashkernel=" value
|
|
|
|
accordingly in case of OOM issue.
|
|
|
|
Besides, kdump initramfs won't automatically include the device drivers
|
|
|
|
which support device dump, only device drivers that are required for
|
|
|
|
the dump target setup will be included. To ensure the device dump data
|
|
|
|
will be included in the vmcore, you need to force include related
|
|
|
|
device drivers by using "extra_modules" option in /etc/kdump.conf
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
|
2015-09-25 08:19:44 +00:00
|
|
|
Parallel Dumping Operation
|
|
|
|
==========================
|
2020-05-09 10:25:23 +00:00
|
|
|
|
2015-09-25 08:19:44 +00:00
|
|
|
Kexec allows kdump using multiple cpus. So parallel feature can accelerate
|
|
|
|
dumping substantially, especially in executing compression and filter.
|
|
|
|
For example:
|
|
|
|
|
|
|
|
1."makedumpfile -c --num-threads [THREAD_NUM] /proc/vmcore dumpfile"
|
|
|
|
2."makedumpfile -c /proc/vmcore dumpfile",
|
|
|
|
|
|
|
|
1 has better performance than 2, if THREAD_NUM is larger than two
|
|
|
|
and the usable cpus number is larger than THREAD_NUM.
|
|
|
|
|
|
|
|
Notes on how to use multiple cpus on a capture kernel on x86 system:
|
|
|
|
|
|
|
|
Make sure that you are using a kernel that supports disable_cpu_apicid
|
|
|
|
kernel option as a capture kernel, which is needed to avoid x86 specific
|
|
|
|
hardware issue (*). The disable_cpu_apicid kernel option is automatically
|
|
|
|
appended by kdumpctl script and is ignored if the kernel doesn't support it.
|
|
|
|
|
|
|
|
You need to specify how many cpus to be used in a capture kernel by specifying
|
|
|
|
the number of cpus in nr_cpus kernel option in /etc/sysconfig/kdump. nr_cpus
|
|
|
|
is 1 at default.
|
|
|
|
|
|
|
|
You should use necessary and sufficient number of cpus on a capture kernel.
|
|
|
|
Warning: Don't use too many cpus on a capture kernel, or the capture kernel
|
|
|
|
may lead to panic due to Out Of Memory.
|
|
|
|
|
|
|
|
(*) Without disable_cpu_apicid kernel option, capture kernel may lead to
|
|
|
|
hang, system reset or power-off at boot, depending on your system and runtime
|
|
|
|
situation at the time of crash.
|
|
|
|
|
2020-05-09 10:25:23 +00:00
|
|
|
|
2013-06-14 14:56:40 +00:00
|
|
|
Debugging Tips
|
2020-05-09 10:25:23 +00:00
|
|
|
==============
|
|
|
|
|
2013-06-14 14:56:40 +00:00
|
|
|
- One can drop into a shell before/after saving vmcore with the help of
|
|
|
|
using kdump_pre/kdump_post hooks. Use following in one of the pre/post
|
|
|
|
scripts to drop into a shell.
|
|
|
|
|
|
|
|
#!/bin/bash
|
|
|
|
_ctty=/dev/ttyS0
|
|
|
|
setsid /bin/sh -i -l 0<>$_ctty 1<>$_ctty 2<>$_ctty
|
|
|
|
|
|
|
|
One might have to change the terminal depending on what they are using.
|
|
|
|
|
|
|
|
- Serial console logging for virtual machines
|
|
|
|
|
|
|
|
I generally use "virsh console <domain-name>" to get to serial console.
|
|
|
|
I noticed after dump saving system reboots and when grub menu shows up
|
|
|
|
some of the previously logged messages are no more there. That means
|
|
|
|
any important debugging info at the end will be lost.
|
|
|
|
|
|
|
|
One can log serial console as follows to make sure messages are not lost.
|
|
|
|
|
|
|
|
virsh ttyconsole <domain-name>
|
|
|
|
ln -s <name-of-tty> /dev/modem
|
|
|
|
minicom -C /tmp/console-logs
|
|
|
|
|
|
|
|
Now minicom should be logging serial console in file console-logs.
|